In conducting our business, we process, transmit and store sensitive, proprietary and confidential information about our employees, customers, vendors, and other parties, including business and personal information. This information may include account access credentials, credit and debit card numbers, bank account numbers, social security numbers, driver's license numbers, names and addresses and other types of sensitive business or personal information. Some of this information is also processed and stored by our third-party service providers to whom we outsource certain functions and other agents, including our customers, which we refer to collectively as our associated third parties.
We are a regular target of malicious third-party attempts, some of which have been successful, to identify and exploit system vulnerabilities and/or penetrate or bypass our security measures in order to gain unauthorized access to our networks and systems or those of our associated third parties. Such access has led and could lead in the future to the compromise of sensitive, business, personal or confidential information or instructions to transfer funds by us or customers to unauthorized recipients. In the third quarter during the year ended December 31, 2022, we experienced an immaterial security breach that successfully redirected payments from BioLife customers to unauthorized bank accounts. As a result, we proactively employ multiple methods at different layers of our systems to defend our systems against intrusion and attack and to protect the data we collect. These measures have been breached in the past, and we cannot be certain that they will be successful and sufficient to counter current and emerging technology threats that are designed to breach our systems in order to gain access to confidential information.
The techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently and are often difficult to detect. Threats to our systems and our associated third parties' systems can derive and have derived from human error, fraud or malice on the part of employees or third parties, or may result from accidental technological failure, including as a result of natural disasters, power failures or other events beyond our control. Computer viruses and other malware can be distributed and have infiltrated, and could in the future infiltrate, our systems or those of our associated third parties. In addition, denial of service or other attacks could be launched against us for a variety of purposes, including to interfere with our services or create a diversion for other malicious activities. Our defensive measures in the past have not, and in the future, may not, prevent downtime, unauthorized access, or use of sensitive data. Further, while we select our associated third parties carefully, and we seek to ensure that our customers adequately protect their systems and data, we do not control their actions and are not able to oversee their processes. Any problems experienced by our associated third parties, including those resulting from breakdowns or other disruptions in the services provided by such parties or cyber-attacks and security breaches, could adversely affect our ability to conduct our business and our financial condition.
We could also be subject to liability for claims relating to the loss or misuse of personal information, such as violation of data privacy laws. We cannot provide assurance that the contractual requirements related to security and privacy that we impose on our service providers who have access to our data, including customer information, will be followed or will be adequate to prevent the unauthorized use or disclosure of such data. Any failure to adequately enforce or provide these protective measures or to prevent unauthorized access to our data, including customer information could result in liability, loss of business, protracted and costly litigation, governmental intervention, fines and damage to our reputation.